tag:blogger.com,1999:blog-7936586016742929815.post-9904168303530642012018-03-05T08:11:00.001-05:002018-03-05T23:39:22.842-05:00Target 4G LTE users<div dir="ltr" style="text-align: left;" trbidi="on">There is no dearth of vulnerabilities to turn the cyber world into a den of hackers. Even 4G LTE users are bracing up for a huge threat of being hacked where the attackers have at hand some devices to help them eavesdrop the phone calls, get text messages. <br /><br />Cyber experts doing extensive research at two prominent universities claimed to have discovered device deployed to connect network by the hackers to receive the phone calls and message.<br /><br />According to what the researchers at Purdue University and the University of Iowa, the hackers have exploited the three major lapses in the protocol where a cellular network operates. This is where the hackers strike connecting a 4G LTE network to receive a phone call along with the real receiver. <br /><br />This is what the cyber security experts call authentication relay deployed by the attackers to receive phone calls and text messages. Similarly, the system is useful for the hackers to locate the users and to disrupt the network. <br /><br />A recent research paper has spoken volumes of how the attackers can strike at ease taking the advantage of the vulnerabilities which require a mechanism to help an expert spot the real vulnerabilities in a network.<br /><br />The experts blame it all on the lack of proper authentication encryption for most of the attacks these days. The conclusion came up after verifying the these with SIM cards at a devise which they call testbed. <br /><br />The hackers, further, use vulnerable elements disrupt the criminal investigation process where wrong locations are shown to be the source of operation.<br /><br />Yet another attack seems to have surfaced these days where the users are allowed to receive alert messages and once these are properly received the entire networking system slips into a chaos.<br /><br />Cyber security experts have yet to disclose the entire materials on security reasons and keep researching for more clues to counter the vulnerabilities.<br /><br /><br /></div>Prasanta Baruahhttps://www.blogger.com/profile/08073795121944204571noreply@blogger.com